4.
Associate the TLS ALG object with the newly created service object.
5.
Create a NAT or Allow IP rule for the targeted traffic and associate the custom service object
with it.
6.
Optionally, a SAT rule can be created to change the destination port for the unencrypted traffic.
Alternatively an SLB_SAT rule can be used to do load balancing (the destination port can also
be changed through a custom service object).
URLs Delivered by Servers
It should be noted that using NetDefendOS for TLS termination will not change URLs in webpages
delivered by servers which lie behind the NetDefend Firewall.
What this means is that if a client connects to a webserver behind the NetDefend Firewall using the
https:// protocol then any web pages delivered back containing absolute URLs with the http://
protocol (perhaps to refer to other pages on the same site) will not have these URLs converted to
https:// by NetDefendOS. The solution to this issue is for the servers to use relative URLs instead of
absolute ones.
Cipher Suites Supported by NetDefendOS TLS
NetDefendOS TLS supports the following cipher suites:
1.
TLS_RSA_WITH_3DES_EDE_CBC_SHA.
2.
TLS_RSA_WITH_RC4_128_SHA.
3.
TLS_RSA_WITH_RC4_128_MD5.
4.
TLS_RSA_EXPORT_WITH_RC4_56_SHA (certificate key size up to 1024 bits).
5.
TLS_RSA_EXPORT_WITH_RC4_40_MD5 (certificate key size up to 1024 bits).
6.
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (certificate key size up to 1024 bits).
7.
TLS_RSA_WITH_NULL_MD5.
8.
TLS_RSA_WITH_NULL_SHA.
NetDefendOS TLS Limitations
As discussed above, NetDefendOS TLS provides support for server side termination only. The other
limitations that should be noted.
•
Client authentication is not supported (where NetDefend Firewall authenticates the identity of
the client).
•
Renegotation is not supported.
•
Sending server key exchange messages is not supported which means the key in the certificate
must be sufficiently weak in order to use export ciphers.
•
The certificate chain used by NetDefendOS can contain at most 2 certificates.
6.2.10. The TLS ALG
Chapter 6. Security Mechanisms
296
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...